{"api_version":"1","generated_at":"2026-04-21T08:59:53+00:00","cve":"CVE-2023-1615","urls":{"html":"https://cve.report/CVE-2023-1615","api":"https://cve.report/api/cve/CVE-2023-1615.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1615","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1615"},"summary":{"title":"CVE-2023-1615","description":"The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","state":"PUBLIC","assigner":"security@wordfence.com","published_at":"2023-06-09 06:15:00","updated_at":"2023-11-07 04:04:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers","name":"https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers","refsource":"MISC","tags":[],"title":"Ultimate Addons for Contact Form 7 – WordPress plugin | WordPress.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255","name":"https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve","refsource":"MISC","tags":[],"title":"Ultimate Addons for Contact Form 7 <= 3.1.23 - Authenticated(Subscriber+) SQL Injection","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/changeset/2901676/","name":"https://plugins.trac.wordpress.org/changeset/2901676/","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1615","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1615","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1615","vulnerable":"1","versionEndIncluding":"3.1.23","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"themefic","cpe5":"ultimate_addons_for_contact_form_7","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1615","ASSIGNER":"security@wordfence.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"psdtowpservice","product":{"product_data":[{"product_name":"Ultimate Addons for Contact Form 7","version":{"version_data":[{"version_affected":"=","version_value":"3.1.23"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve","refsource":"MISC","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve"},{"url":"https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers","refsource":"MISC","name":"https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers"},{"url":"https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255","refsource":"MISC","name":"https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255"},{"url":"https://plugins.trac.wordpress.org/changeset/2901676/","refsource":"MISC","name":"https://plugins.trac.wordpress.org/changeset/2901676/"}]},"credits":[{"lang":"en","value":"Etan Imanol Castro Aldrete"}],"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}]}},"nvd":{"publishedDate":"2023-06-09 06:15:00","lastModifiedDate":"2023-11-07 04:04:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:themefic:ultimate_addons_for_contact_form_7:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"3.1.23","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}